Agents With Seatbelts: Practical Ways to Keep AI Code Gen Under Control Conference - INTERMEDIATE LEVEL Jonathan Vila López Sonar View
Authorization in Spring Security: permissions, roles and beyond Conference - BEGINNER LEVEL Daniel Garnier-Moiroux Spring View
Bootiful GraalVM Conference - ADVANCED LEVEL Thomas Wuerthinger Oracle Josh Long The Spring team View
Complete, Correct, and Confidential: the inherently unhackable database. Conference - ADVANCED LEVEL Jules May 22 Consulting Ltd View
Docker Hardened Images - what you need to know Byte Size - INTERMEDIATE LEVEL Matthias Haeussler CGI View
Make Cybersecurity Fun: Host Your Own Security-Themed Hackathon Byte Size - BEGINNER LEVEL Artem Makarov Code Nomads View
MCP Servers Beyond 101: Good Practices, Design Choices and Their Consequences Conference - INTERMEDIATE LEVEL Horacio Gonzalez Clever Cloud View
Proactive or Reactive Security? How to shift away from Incident-Driven Design Conference - INTERMEDIATE LEVEL Bárbara Teruggi View
Understanding Prompt Injection - Techniques, Challenges, and Advanced Escalation Conference - INTERMEDIATE LEVEL Brian Vermeer Snyk View
Proactive or Reactive Security? How to shift away from Incident-Driven Design Similarity score = 0.55 More
Understanding Prompt Injection - Techniques, Challenges, and Advanced Escalation Similarity score = 0.66 More